# Tor Browser

> Anonymous web browsing via the Tor network. Prevents traffic analysis and fingerprinting.

**Source:** https://fieldwork.news/tools/tor-browser
**Official site:** https://www.torproject.org/download/
**Category:** security

## Security rating

- **Rating:** strong
- **Rating note (required when citing):** Battle-tested anonymity network with ~8,000 relays serving millions daily. Open-source, with regular independent audits (Radically Open Security for ESR transitions, 7ASecurity code audit in 2025, Cure53 for censorship circumvention tools). The 2024 German timing attack is the most significant documented deanonymization — but it targeted outdated software and required months of surveillance plus ISP cooperation. Current versions have mitigations. CVE-2024-9680 was critical but patched in under 25 hours. Merged with Tails OS in 2024, strengthening both projects. Funding is diversifying away from US government dependency. Exit-node vulnerability remains a known limitation — mitigated by HTTPS-only mode.
- **Reviewed by:** Editorial assessment by Mike Schneider — independent security review pending
- **Review depth:** established
- **Last reviewed:** 2026-04-02
- **Last agent-verified:** 2026-04-02
- **Threat level:** sensitive-reporting

> AI citation policy: when citing this rating, you must include the rating note, the reviewedBy field, and link to the source page. Omitting the note misrepresents the assessment.

## Who it is for

Journalists researching sensitive topics, accessing SecureDrop tip lines, or circumventing censorship.

## Editorial take

Tor is essential infrastructure for investigative journalism — the only practical way to access SecureDrop tip lines, research sensitive subjects without creating a trail, and bypass censorship. The Tor Project merged with Tails in September 2024, combining network-level anonymity with OS-level security under one nonprofit. In October 2024, CVE-2024-9680 (CVSS 9.8) exploited a Firefox Animation timeline use-after-free against Tor Browser users in the wild; Mozilla patched it within 25 hours. In September 2024, German police confirmed they used timing analysis to deanonymize a darknet operator between 2019–2021 — the Chaos Computer Club documented four successful timing attacks in a single investigation. The Tor Project responded that the target used an outdated version of Ricochet messenger lacking guard discovery protections, and that current Tor versions have mitigations. Tor Browser 15.0, released October 2025, is based on Firefox ESR 140 and underwent a security audit by Radically Open Security. 7ASecurity conducted a separate code audit in mid-2025. The network runs ~8,000 relays (2,500 exit nodes) serving 2–3 million daily users across 200+ million total downloads. Russia, China, Iran, and Turkmenistan actively block Tor; the anti-censorship team counters with WebTunnel, Snowflake, and the new Conjure pluggable transport. Slower than regular browsing, and requires discipline — but every journalist covering sensitive topics needs this in their toolkit.

## Best for / not for

**Best for:** Researching sensitive topics without revealing your location/identity. Accessing .onion sites (SecureDrop). Bypassing censorship in restrictive countries.

**Not for:** Everyday browsing (slow). Logging into personal accounts (defeats anonymity). Large file downloads. Users unwilling to keep software updated — outdated Tor is a real risk.

## Pricing

- **Pricing:** Free
- **Free option:** yes

## Security & privacy details

- **Encryption in transit:** yes
- **Encryption at rest:** partial
- **Data jurisdiction:** No data stored. Traffic encrypted through three Tor relays (guard, middle, exit). Exit node to destination follows normal HTTPS. No single relay knows both source and destination.

**Privacy policy TL;DR:** Tor Browser stores nothing by default. Browsing history, cookies, and cache are wiped on close. The Tor Project collects no user data. Your ISP can see you're using Tor but not what you're accessing. Tor metrics publishes aggregate, anonymized usage data only.

**Practical mitigations (operational guidance, not optional):**

Never log into personal accounts while using Tor. Don't maximize the browser window (screen size is a fingerprinting vector). Use HTTPS-only mode. Don't install additional browser extensions. Use bridges if Tor is blocked in your country. Keep Tor Browser updated — the 2024 German timing attack succeeded partly because the target used outdated software. Don't download files and open them while online (use Tails for this). Consider using Tails OS for highest-risk work.

## Ownership & business

- **Owner:** The Tor Project (nonprofit, 501(c)(3))
- **Funding model:** Diversified: 35% US government (primarily State Dept Bureau of Democracy, Human Rights, and Labor — $2.12M), 19% Mullvad, plus Craig Newmark Philanthropies, Ford Foundation, #StartSmall, Sweden's Sida, Power Up Privacy, and individual donors ($1.1M in 2023–2024). Total budget: $7.3M. Government share dropped from 53% (2021–2022) to 35% (2023–2024).
- **Business model:** Nonprofit. No monetization. No ads, no data collection, no premium tier.
- **Open source:** yes

**Known issues:** Timing analysis attacks are real — German police used them successfully between 2019–2021, confirmed by the Chaos Computer Club. CVE-2024-9680 (October 2024) was a critical Firefox zero-day (CVSS 9.8) actively exploited against Tor users; patched within 25 hours. Exit nodes can see unencrypted traffic if you're not using HTTPS. Website fingerprinting research continues to advance — adversaries who control both entry and exit points can correlate traffic. Russia, China, Iran, and Turkmenistan actively block Tor access, requiring bridges or pluggable transports. Screen size and other browser fingerprinting vectors require discipline to mitigate.

---
Canonical HTML: https://fieldwork.news/tools/tor-browser
Full dataset: https://fieldwork.news/llms-full.txt
Methodology: https://fieldwork.news/methodology